PatchSiren cyber security CVE debrief
CVE-2026-8428 Concrete CMS CVE debrief
CVE-2026-8428 is a cross-site request forgery issue in Concrete CMS’s core update flow. The update form renders a CSRF token, but the corresponding controller action does not validate it before processing the request. As a result, a cross-site POST can reach the update handler and trigger a core CMS update to an attacker-influenced version string, provided the victim canUpgrade() check passes and a valid update version exists under DIR_CORE_UPDATES. The vulnerability was published on 2026-05-21 and carries a CVSS v4.0 score of 7.5 (High).
- Vendor
- Concrete CMS
- Product
- Unknown
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-21
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-21
- Advisory updated
- 2026-05-21
Who should care
Administrators and security teams running Concrete CMS 9.5.0 or earlier, especially environments where authenticated users can access the dashboard update workflow.
Technical summary
According to the supplied description, the local_available_update.php view emits a token with $token->output('do_update'), but concrete/controllers/single_page/dashboard/system/update/update.php does not call $this->token->validate('do_update') in do_update(). That mismatch leaves the update action exposed to CSRF. The NVD record lists the issue with CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N and secondary weaknesses CWE-352 and CWE-829. The vulnerability is conditional on the victim passing canUpgrade() and on a valid update version being present under DIR_CORE_UPDATES.
Defensive priority
High. The issue can impact integrity and availability of the CMS update path, and it is reachable over the network with user interaction.
Recommended defensive actions
- Review the Concrete CMS update controller and ensure the do_update action validates the expected CSRF token before processing any update request.
- Upgrade to a vendor-fixed release if one is available in the referenced Concrete CMS release history.
- Restrict access to the dashboard and update functionality to trusted administrative users and networks.
- Monitor for unexpected update attempts or version changes in the CMS update logs and related audit trails.
- Verify that any deployed instance is not running 9.5.0 or earlier without the vendor patch applied.
Evidence notes
The supplied NVD record for CVE-2026-8428 states that the update form emits a token but the controller does not validate it, enabling CSRF against the core update action. NVD also references Concrete CMS 9.5.1 release notes as the product-linked source. The corpus provided here does not include the full release note text, so fix details beyond the CVE description are not asserted.
Official resources
-
CVE-2026-8428 CVE record
CVE.org
-
CVE-2026-8428 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
ff5b8ace-8b95-4078-9743-eac1ca5451de
Publicly disclosed on 2026-05-21. This debrief is based only on the supplied NVD record and the referenced Concrete CMS release-notes link.